Dear All, In fortianalyzer I created a simple custom report. I should
filter this report by several source ip, but the filter section doesn't
enable to use the same "log field" more than once.How can I create
filter to use a bunch of ip addresses? th...
Dear All, If the asymroute is enabled, is there any way to
filter/list/check somehow the traffics those don't have any sessions
(what is the target of the asymroute enable settings) ?I'm trying to
find those and drive them in the right path. thank yo...
Dear All, I would like to make different ips security policies for
different services (accepted by the appropriate firewall policies),
however I have a confusion with signature categories. First I thought
that for the https web services it is enough ...
Dear All, I have a 40F device 6.2.4, and there is no firewall policy6,
only:policy Configure IPv4/IPv6 policies.policy46 Configure IPv4 to IPv6
policies.policy64 Configure IPv6 to IPv4 policies. So I check the system
settings, and I found that consol...
Dear All, I should capture traffic between two host so AND logic is
required. My problem is the cli diag sniffer would be a perfect tool but
it cannot write captured packets to disk, while in the gui's
network/capture packet can not make and AND logi...
The sql query work at last. That was my fault: in chart there was a
top10 limitation. (Also change srcip to ipstr(srcip) in the where
clause)The original question is still remain: how can I filter more
individual ip addresses in the filter section of...
Thank you for reply!Your suggestion doesn't seem to work, the report
shows all ips that come from my dataset. (I tried separate ips with
commas and space also)I created a custom report in fortianalyzer, then
edit report > settings > filter section. I...
OK, it is clear now, that not only the protocol category exists, but
there are os, target categories also, which includes the appropriate TCP
only signatures....A new question:I would like to protect an email
server. Should the filter include the cli...